Acquisition method of authentication policy, authentication method, authentication device, communication device, and terminal

An authenticator and authentication technology, which is applied in the field of authentication, can solve problems such as authentication failure, and achieve the effects of complete authentication methods, complete authentication objects and authentication methods, and rich authentication methods

Inactive Publication Date: 2012-11-07
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] Similarly, when the MS performs re-authentication, the above-mentioned problems may cause authentication failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acquisition method of authentication policy, authentication method, authentication device, communication device, and terminal
  • Acquisition method of authentication policy, authentication method, authentication device, communication device, and terminal
  • Acquisition method of authentication policy, authentication method, authentication device, communication device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0123] The present invention also provides a first implementation manner of a base station, where the base station 610 is located in the communication system 600 . The communication system includes a base station 610 and an authenticator 620 . The base station 610 includes an authentication policy processing unit 611, configured to add an authentication policy including an indication that an authentication object is a user and / or a device in a network discovery and selection message. The base station 610 is configured to deliver the network discovery and selection message carrying the authentication policy to the terminal during the network discovery and selection phase.

[0124] The authenticator 620 includes an authentication policy acquisition unit 621 . The authenticator 620 is configured to receive an authentication policy request carrying the authentication policy supported by the terminal and the terminal NAI from the base station 610 , and return an authentication pol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The authorizing method includes steps: down sending authorizing strategy on network side in use for directing the device to carry out authorizing operation to the terminal; the terminal receives the said authorizing strategy; combining the authorizing strategy setup in advance with the down sent authorizing strategy on network side carries out authorizing operation to the terminal. The communication device includes base station, and authorizing strategy process unit (ASPU). ASPU is in use for adding the direction of authorizing strategy into message of finding and selecting network. The base station is in use for down sending the said message with carried authorizing strategy to the terminal. The invention improves authorizing flow, and raises authorizing success ratio.

Description

technical field [0001] The invention relates to the field of authentication, in particular to a method for acquiring an authentication strategy, an authentication method, an authenticator, a communication device, a base station and a terminal. Background technique [0002] Worldwide Interoperability for Microwave Access (WiMAX, Worldwide Interoperability for Microwave Access) is a wireless metropolitan area network technology based on the IEEE 802.16 standard. The WiMAX network using this technology is mainly composed of three parts, namely the client (MSS / SS), the access service network (ASN) and the connection service network (CSN). ASN includes a base station (BS) and an access service network gateway (ASN GW). The ASN belongs to a Network Access Point (NAP, Network Access Point), and the CSN belongs to a Network Service Provider (NSP, Network service provider). When we talk about the authentication strategy of NSP in this article, it can be understood as the authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W28/16H04W88/02H04W88/08
Inventor 吴建军顾亮
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products